全文获取类型
收费全文 | 2549篇 |
免费 | 131篇 |
国内免费 | 59篇 |
专业分类
管理学 | 787篇 |
民族学 | 4篇 |
人才学 | 2篇 |
人口学 | 14篇 |
丛书文集 | 153篇 |
理论方法论 | 93篇 |
综合类 | 1496篇 |
社会学 | 111篇 |
统计学 | 79篇 |
出版年
2024年 | 4篇 |
2023年 | 26篇 |
2022年 | 70篇 |
2021年 | 68篇 |
2020年 | 79篇 |
2019年 | 71篇 |
2018年 | 67篇 |
2017年 | 61篇 |
2016年 | 93篇 |
2015年 | 97篇 |
2014年 | 139篇 |
2013年 | 170篇 |
2012年 | 157篇 |
2011年 | 193篇 |
2010年 | 154篇 |
2009年 | 165篇 |
2008年 | 132篇 |
2007年 | 160篇 |
2006年 | 160篇 |
2005年 | 168篇 |
2004年 | 133篇 |
2003年 | 94篇 |
2002年 | 73篇 |
2001年 | 46篇 |
2000年 | 23篇 |
1999年 | 21篇 |
1998年 | 15篇 |
1997年 | 7篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 13篇 |
1993年 | 8篇 |
1992年 | 15篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 8篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有2739条查询结果,搜索用时 203 毫秒
1.
传统的国际关系理论,无论是现实主义、自由主义、建构主义还是科学行为主义理论,都是把主权国家抽象成一个统一的国际关系行为体。这一行为主体有一致的利益,也自然要有一致的对外政策目标和手段。在20世纪,尤其是在两次世界大战和冷战期间,这一概念抽象是非常准确的。但冷战结束以后,尤其是进入21世纪以后,这一概念抽象逐渐与国际关系的现实相违背。一方面,国家综合实力并不能直接转化为具体领域的竞争优势;另一方面,很多国家,包括超级大国在内,其对外政策的主要阻力可能不是所谓的竞争对手,而是其国内不同的利益集团。这导致传统的国际关系理论,从假设到概念和推理层面,都已经无法解释和预测今天的世界,而权力小博弈理论可以为认识多元复杂互动博弈时代的国际关系提供一个新的解释框架。 相似文献
2.
We study interdependent risks in security, and shed light on the economic and policy implications of increasing security interdependence in presence of reactive attackers. We investigate the impact of potential public policy arrangements on the security of a group of interdependent organizations, namely, airports. Focusing on security expenditures and costs to society, as assessed by a social planner, to individual airports and to attackers, we first develop a game-theoretic framework, and derive explicit Nash equilibrium and socially optimal solutions in the airports network. We then conduct numerical experiments mirroring real-world cyber scenarios, to assess how a change in interdependence impact the airports' security expenditures, the overall expected costs to society, and the fairness of security financing. Our study provides insights on the economic and policy implications for the United States, Europe, and Asia. 相似文献
3.
《Risk analysis》2018,38(8):1559-1575
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game‐theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost‐effective decisions than selfish nonrational or semirational players. 相似文献
4.
Reid Skibell 《Information, Communication & Society》2002,5(3):336-356
The seriousness of computer hacking is not exaggerated, it is far worse than that. The computer hacker has attained the status of myth; society associates all computer crime with a mythical perpetrator that bears no resemblance to reality. This paper will argue that in the early stages of the myth the computer hacker was regarded as a highly skilled but mentally disturbed youth who has an unhealthy association with computers. The new reality of electronic commerce resulted in pressures that culminated in the computer hacker becoming regarded as a dangerous criminal. A thorough analysis of the statistics will demonstrate that the majority of computer intruders are neither dangerous nor highly skilled, and thus nothing like the mythical hacker. 相似文献
5.
农业投入中政府与农户的博弈分析 总被引:1,自引:0,他引:1
杨晓萍 《重庆交通学院学报(社会科学版)》2005,5(4):82-85
农业投入状况关系着农业生产和农村经济的发展。目前农业投入不足已成为制约我国整体经济发展的“瓶颈”。在是否增加农业投入的问题上,政府与农户之间存在着一种博弈关系。通过农业投入不足的现状考察,用博弈的方法阐释农业投入不足的原因,提出加大农业投入的几点对策。 相似文献
6.
计算机辅助教学是传统教学模式的一个根本性变革 ,在高等教育中发挥的作用越来越明显。探讨了在进行计算机辅助教学课件 (CAI)的开发过程中 ,当前普遍存在的问题及其产生的原因 ,同时 ,初步提出了解决这些问题的方法 ,指出 CAI课件应向网络化、智能化方向发展 相似文献
7.
丁社教 《兰州大学学报(社会科学版)》2008,36(3)
中国的人性论生发出的圣人治国,是对人性的否定,产生的是囚徒困境难题;西方的人性论产生的是法律治国,是对人性的肯定,破解了囚徒困境难题.从博弈论视角看,出现如此分野的原因是,中国古代社会政治家们试图设计一种仅有帕累托最优均衡的制度,但因为没有从现实的人性出发,导致只能依靠人治维护表面的帕累托最优均衡,实际上存在的却是囚徒困境;西方社会的政治家们则以承认人性为前提,设计了一种帕累托次优均衡的制度. 相似文献
8.
对于大众传媒作为世界的丰富内涵的阐释,则是传媒批判理论始终如一的目标。具体来说,最初是对于大众传媒作为文化世界的发现;继而,是对于大众传媒作为权力世界的发现;然后,是对于大众传媒作为文本世界的发现;最后,是对于大众传媒作为游戏世界的发现,它意味着文化世界、权力世界、文本世界的消解,也意味着全新的传媒世界的即将莅临。 相似文献
9.
Marc Kennedy Clive Anderson Anthony O'Hagan Mark Lomas Ian Woodward John Paul Gosling Andreas Heinemeyer 《Journal of the Royal Statistical Society. Series A, (Statistics in Society)》2008,171(1):109-135
Summary. A crucial issue in the current global warming debate is the effect of vegetation and soils on carbon dioxide (CO2 ) concentrations in the atmosphere. Vegetation can extract CO2 through photosynthesis, but respiration, decay of soil organic matter and disturbance effects such as fire return it to the atmosphere. The balance of these processes is the net carbon flux. To estimate the biospheric carbon flux for England and Wales, we address the statistical problem of inference for the sum of multiple outputs from a complex deterministic computer code whose input parameters are uncertain. The code is a process model which simulates the carbon dynamics of vegetation and soils, including the amount of carbon that is stored as a result of photosynthesis and the amount that is returned to the atmosphere through respiration. The aggregation of outputs corresponding to multiple sites and types of vegetation in a region gives an estimate of the total carbon flux for that region over a period of time. Expert prior opinions are elicited for marginal uncertainty about the relevant input parameters and for correlations of inputs between sites. A Gaussian process model is used to build emulators of the multiple code outputs and Bayesian uncertainty analysis is then used to propagate uncertainty in the input parameters through to uncertainty on the aggregated output. Numerical results are presented for England and Wales in the year 2000. It is estimated that vegetation and soils in England and Wales constituted a net sink of 7.55 Mt C (1 Mt C = 1012 g of carbon) in 2000, with standard deviation 0.56 Mt C resulting from the sources of uncertainty that are considered. 相似文献
10.
徐虹 《北京工商大学学报(社会科学版)》2008,23(2):72-77
从产权经济学角度对会计信息的产权属性进行分析,把会计信息的产权主体定位为所有的信息使用者,认为会计信息的产权主体与会计信息质量特征之间存在密切关系。不同产权主体之间为有利于自身的信息进行博弈,可靠性和相关性孰轻孰重取决于各方在博弈中的力量对比。最后,文章提出重构会计信息市场、实现可靠性和相关性协调发展的若干对策。 相似文献